The SPDY protocol implementation in Google Chrome before 6.0.472.62 does not properly manage buffers, which might allow remote attackers to execute arbitrary code via unspecified vectors.
http://code.google.com/p/chromium/issues/detail?id=55119
http://googlechromereleases.blogspot.com/2010/09/stable-beta-channel-updates_17.html
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7380
Source: MITRE
Published: 2010-10-05
Updated: 2020-08-03
Type: CWE-190
Base Score: 7.5
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P
Impact Score: 6.4
Exploitability Score: 10
Severity: HIGH
Base Score: 9.8
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Impact Score: 5.9
Exploitability Score: 3.9
Severity: CRITICAL
OR
ID | Name | Product | Family | Severity |
---|---|---|---|---|
800902 | Google Chrome < 6.0.472.62 Multiple Vulnerabilities | Log Correlation Engine | Web Clients | high |
5669 | Google Chrome < 6.0.472.62 Multiple Vulnerabilities | Nessus Network Monitor | Web Clients | medium |
49285 | Google Chrome < 6.0.472.62 Multiple Vulnerabilities | Nessus | Windows | high |